Exposure of senstive information to an unauthorised actor in the "com.onepeloton.erlich" mobile application up to and including version 1.7.22 allows a remote attacker to access developer files stored in an AWS S3 bucket, by reading credentials stored in plain text within the mobile application.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-27702 | Exposure of senstive information to an unauthorised actor in the "com.onepeloton.erlich" mobile application up to and including version 1.7.22 allows a remote attacker to access developer files stored in an AWS S3 bucket, by reading credentials stored in plain text within the mobile application. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://twitter.com/ROPsicle/status/1438216078103044107?s=20 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T02:44:10.787Z
Reserved: 2021-09-06T00:00:00.000Z
Link: CVE-2021-40527
No data.
Status : Modified
Published: 2021-10-25T11:15:07.720
Modified: 2024-11-21T06:24:19.660
Link: CVE-2021-40527
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD